HetrixTools is pleased to present our own in-house custom built Uptime Monitor, a system that allows you to monitor all of your websites and services with ease and accuracy, notifying you as soon as an outage occurs and generating private/public (even white label) insightful reports that you can share with your clients or colleagues.

-= Packages =-

FREE – for life

5 Uptime…

Uptime Monitoring & Server Monitoring – Minimize your downtime by being the first to know about it!

I live in a city where CCTV camera coverage is comprehensive and increasing. Cameras are getting cheaper and higher resolution. Everyone has a video camera in their pocket already, and we are starting to see trends which indicate always-on cameras may become commonplace in other devices like glasses.

It has occurred to me, when out in public and entering my username/password into apps on my phone and laptop, that if a camera could capture both my screen and my keyboard, it could be fairly straightforward for a viewer to grab or guess my credentials from the footage assuming a high enough resolution image and the view not being (too) obscured.

Without going too much into the details of how it would be implemented, the accuracy and cost etc, I have a background in image processing and so am also aware that this would likely be automatable to at least some degree.

So I thought I would ask the community here if this is actually a viable risk? Have there been any known instances of it happening already? Are people thinking about this with respect to the viability of plaintext credential entry into apps in the long run?

If not, then why is it often claimed that the blockchain scaling issue is due to the fact that all tx has to be verified by all full nodes?

As long as a mining node found the correct nonce, the tx will be added to the block and the blockchain advances. It does not matter if the tx is not yet verified by some full nodes in the network.

(Yes, it will most probably get verified by all full nodes after it got into the block and the block propagates throughout the network. But this is not relevant as the blockchain already advanced (assuming there is no fork).)

I would like to ask a question that might be hopefully in the scope and specificity of this site but I need clarification to proceed on investigation.

Please advise if this is appropriate or if I can provide further clarification as I do not have all details but want to investigate further.

There is a contact of mine who recently has been receiving emails on the domain of their site where there is a login place and an option to enter email’s from their default WordPress user stating the following.

Password changed for the user: username.

To date, numerous emails have started being generated to the email of the owner of their site where they conduct their business.

What steps should I take to be able to uncover why the email reset notifications are set? If there is specific details needed I can provide further to the best of my ability.

So far the status of the site has ssl disabled as far as I can observe and that the site is hosted via 1&1 hosting and that it is using cpanel and WordPress as the site builder.